r00t-3xp10it / redpill
Assist reverse tcp shells in post-exploration tasks
☆216Updated 11 months ago
Alternatives and similar repositories for redpill:
Users that are interested in redpill are comparing it to the libraries listed below
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆212Updated 3 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆225Updated 3 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆286Updated 2 years ago
- ☆323Updated last year
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆266Updated 2 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆162Updated 3 years ago
- XLL Phishing Tradecraft☆412Updated 2 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆168Updated 3 years ago
- Bypass AMSI by patching AmsiScanBuffer☆258Updated 3 years ago
- ☆189Updated 5 years ago
- A User Impersonation tool - via Token or Shellcode injection☆411Updated 2 years ago
- Basic C2 Server☆187Updated 3 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆258Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆290Updated 3 years ago
- Manipulating and Abusing Windows Access Tokens.☆276Updated 4 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆488Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆307Updated 6 months ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆418Updated 2 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆471Updated 3 years ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆267Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆451Updated 3 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆324Updated 4 months ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆447Updated 11 months ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- PowerShell scripts for communicating with a remote host.☆301Updated last year
- Windows active user credential phishing tool☆280Updated 5 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆900Updated 9 months ago
- PowerShell Asynchronous TCP Reverse Shell☆155Updated last year
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆383Updated 2 years ago
- Various Cobalt Strike BOFs☆617Updated 2 years ago